Claim Missing Document
Check
Articles

Found 32 Documents
Search

Enhancing Data Security and Integrity with Post-Quantum and AES Digital Signatures Puringgar Prasadha Putra, Rayasa; H. A. Danang Rimbawa; Bisyron Wahyudi
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2081

Abstract

Data security and integrity are crucial issues in contemporary information systems, since the emergence of quantum computing presents substantial risks to traditional cryptographic techniques such as RSA and ECC. This work suggests a hybrid technique that combines the Advanced Encryption Standard (AES) for symmetric encryption with Post-Quantum Cryptography (PQC) digital signatures to mitigate these issues. The framework seeks to safeguard sensitive documents, including PDFs, against unauthorized alterations and Man-in-the-Middle (MiTM) attacks. A simulation is executed to illustrate the threats associated with Man-in-the-Middle (MiTM) attacks, whereby the encrypted document and digital signatures are intercepted, altered, and re-encrypted. The technology guarantees data integrity by signature verification and hash comparisons, efficiently identifying and preventing tampering. The findings indicate that the suggested PQC-AES hybrid system not only fortifies defenses against conventional threats but also improves resistance to quantum-based assaults, offering a scalable and safe approach for contemporary data security. The research emphasizes the need of implementing quantum-resistant algorithms to safeguard digital security systems for the future, while preserving the efficacy of existing encryption techniques. The progression of quantum computing presents substantial threats to traditional cryptography methods, including RSA and ECC. These cryptosystems depend on mathematical issues that can be effectively resolved using quantum algorithms, especially Shor's algorithm. Post-Quantum Cryptography (PQC) has emerged as a viable way to mitigate this issue
Quantum Entropy-Based Encryption for Securing Communication Devices in TNI AU Space Units Kencana, Lisdi Inu; H.A Danang Rimbawa; Bisyron Wahyudi
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2091

Abstract

The rising threat of cyber-attacks demands advanced encryption technologies to ensure secure communication. This study evaluates the performance and security of the Quantum Shieldz Cipher integrated with Quantum Entropy-Based Encryption (QEBE) to address the limitations of conventional encryption methods. The main objective is to test the system's ability to generate unpredictable encryption keys, detect interception attempts, and resist quantum-based cyber threats. Experiments were conducted under various operational scenarios, including standard conditions, high interference, and high bandwidth environments, with a focus on its implementation for strategic communication in the Indonesian Air Force (TNI AU).The results show that QEBE effectively generates highly secure encryption keys using the Quantum Random Number Generator (QRNG), significantly reducing the risk of brute-force attacks. The system successfully detects interception by identifying changes in qubit states during data transmission. The implementation within TNI AU demonstrates its effectiveness in securing critical communication systems that require robust protection. However, the system relies heavily on stable network infrastructure with high bandwidth to maintain optimal performance. Compared to conventional methods, QEBE provides superior security and resistance to quantum-based attacks, albeit with a slight trade-off in processing speed. In conclusion, the Quantum Shieldz Cipher integrated with QEBE shows significant potential for enhancing secure communication systems, particularly in critical operations within TNI AU. This technology is a promising solution to safeguard against evolving cyber threats and quantum-based attacks.
IMPLEMENTATION OF A HUMAN FIREWALL TO PREVENT SOCIAL ENGINEERING THREATS IN REALIZING CYBER SECURITY Faidin, Firman; Rimbawa, H.A. Danang; Saputro, J.W.
Eksakta : Jurnal Penelitian dan Pembelajaran MIPA Vol 10, No 1 (2025): Eksakta : Jurnal Penelitian dan Pembelajaran MIPA
Publisher : Fakultas Keguruan Dan Ilmu Pendidikan, UM-Tapsel

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31604/eksakta.v10i1.%p

Abstract

The rapid development of information and communication technology has provided many conveniences in various aspects of life. However, on the other hand, this also brings increasing cyber security threats, one of which is the threat of social engineering. Therefore, this research aims to analyze the implementation of a human firewall to prevent social engineering threats in realizing cyber security. The research method used is a qualitative research method with in-depth interviews with several key informants including cyber security managers, employees involved in training programs, and cyber security experts in PT. Mekar Armada Jaya Magelang. From the results of the research that has been carried out, it can be concluded that the implementation of a human firewall is effective in preventing social engineering threats and improving cyber security. The integration of enabling technology with human training strengthens the company's defenses, while clear security policies and top management support help overcome the challenges of participation and organizational culture change. However, challenges such as low employee participation and resistance to cultural change remain. For greater success, the training approach should be relevant to the employee's role, use technology to increase engagement, and involve employees in the development of training materials. The success and failure case studies found show that this strategy can be adapted and improved continuously.
Analisis SWOT dalam Penentuan Strategi Keamanan Siber pada Implementasi Sistem Internet of Defense Things (IoDT) 5.0 di Industri Pertahanan (PT. Dirgantara Indonesia, PT. Len Industri, dan PT. Pindad) Ra’idah Naufaliana Dewi; H.A Danang Rimbawa; Bisyron Wahyudi
Journal on Education Vol. 7 No. 2 (2025): Journal on Education: Volume 7 Nomor 2 Tahun 2025 In Progress (Januari-Februari
Publisher : Mathematics Education Study Program

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joe.v7i2.8289

Abstract

This study examines the implementation of the Internet of Defense Things (IoDT) 5.0 within the Indonesian defense industry, focusing on cybersecurity aspects. Through a SWOT analysis, the research identifies internal and external factors influencing the success or challenges of IoDT 5.0 implementation. Data collected via observations and questionnaires at PT. Pindad, PT. Dirgantara Indonesia, and PT. Len Industri in Bandung reveal key insights into the effectiveness of access management processes, incident response in cybersecurity, organizational culture and employee awareness of cybersecurity, the readiness of cybersecurity infrastructure, and the competencies of cybersecurity human resources. The findings highlight the critical need to strengthen access management procedures, enhance employee awareness, improve cybersecurity infrastructure, and develop the skills of cybersecurity professionals to address escalating threats. This research provides valuable insights into the challenges and strategic approaches for advancing IoT 5.0 in Indonesia's defense sector.
Redefining hash functions for quantum security with SHA 256 Riswantoro, Dadan Shavkat; Rimbawa, H.A Danang
Journal of Intelligent Decision Support System (IDSS) Vol 8 No 2 (2025): June: Intelligent Decision Support System (IDSS)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/idss.v8i2.301

Abstract

The rapid advancement of quantum computing technology presents a significant challenge to the field of cryptography, particularly affecting the security of hash functions that form the foundation of many cryptographic protocols. Hash functions are widely used to ensure data integrity, generate digital signatures, and securely store passwords. However, the emergence of quantum algorithms—such as Grover’s algorithm—threatens to undermine the security assumptions on which these hash functions are based by significantly reducing their effective security levels.  This paper aims to provide a comprehensive analysis of the vulnerabilities introduced by quantum computing to traditional hash functions, detailing how these weaknesses can be exploited by quantum adversaries. We explore the fundamental properties of hash functions, including pre-image resistance, second pre-image resistance, and collision resistance, and assess how these properties are affected in a quantum context. Furthermore, we examine the implications of these vulnerabilities for existing cryptographic systems and emphasize the urgent need for the development of post-quantum cryptographic standards. In response to these challenges, we review ongoing research efforts focused on designing hash functions that are resilient to quantum attacks. We evaluate several promising candidates for post-quantum hash functions, considering their security properties, performance metrics, and practical applicability. The findings of this paper highlight the necessity of transitioning to post-quantum cryptographic solutions to safeguard sensitive information in an increasingly quantum-capable world. Ultimately, we advocate for proactive measures within the cryptographic community to adopt and implement these new standards, thereby ensuring robust data security in the age of quantum computing.
Studi Pustaka: Optimalisasi Deteksi Malware melalui Integrasi Pembelajaran Mesin Heuristik dan Big Data untuk Keamanan Siber Supriyadi, Devi; Wahyudi, Bisyron; Rimbawa, Danang
Komputa : Jurnal Ilmiah Komputer dan Informatika Vol 14 No 1 (2025): Komputa : Jurnal Ilmiah Komputer dan Informatika
Publisher : Program Studi Teknik Informatika - Universitas Komputer Indonesia (UNIKOM)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/komputa.v14i1.15595

Abstract

The increasingly complex and dynamic threat of malware drives the need for a more adaptive detection strategy than conventional signature-based methods. This study aims to evaluate the effectiveness of machine learning, heuristics, and big data approaches in detecting modern malware. The main problem raised is the limitation of traditional methods in identifying new malware variants, especially those that use obfuscation techniques such as polymorphism and metamorphism. Using a systematic literature study approach to the 2016-2024 literature from various reputable sources, this study compares the performance of each approach based on accuracy, efficiency, and resistance to adversarial attacks. The results of the analysis show that deep learning models such as the Convolutional Neural Network (CNN) have the highest detection accuracy, while heuristic methods excel in initial detection efficiency, and big data provides advantages in the scalability of real-time detection systems. This study concludes that the hybrid integration of these three approaches has the potential to create a malware detection system that is more adaptive and resilient to cyberattacks, although further empirical validation is still needed for real-world implementation.
Artificial intelligence-based hand gesture recognition for sign language interpretation Rais, M. Fazil; AlFatrah, M. Ilham; Noorta, Chadafa Zulti; Rimbawa, H.A Danang; Atturoybi, Abdurrosyid
Jurnal Mandiri IT Vol. 14 No. 1 (2025): July: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v14i1.395

Abstract

This paper presents an artificial intelligence-based system for real-time hand gesture recognition to support sign language interpretation for the deaf and hard-of-hearing community. The proposed system integrates computer vision techniques with deep learning models to accurately identify static hand gestures representing alphabetic signs. The MediaPipe framework is employed to detect and track hand landmarks from live video input, which are then processed and classified using a Convolutional Neural Network (CNN) model. The model is trained on a publicly available BISINDO (Bahasa Isyarat Indonesia) gesture dataset retrieved from Kaggle, comprising 312 images across 26 hand gestures captured under multiple background conditions. Preprocessing includes resizing, grayscale conversion, data augmentation, and landmark extraction with specific innovations in preprocessing techniques, such as the use of advanced data augmentation methods and landmark normalization, which significantly enhance gesture identification accuracy and model robustness. Experimental results show that the system achieves an average classification accuracy of 88.03% and maintains stable performance in real-time applications. Despite these promising results, the system exhibits limitations, including challenges with dynamic gesture recognition, background interference, and limited handling of complex hand movements, all of which can be explored in future research to improve the system’s accuracy and generalization. These findings highlight the system’s potential as an inclusive communication tool to bridge language barriers between deaf individuals and non-signers. This research contributes to the development of accessible assistive technologies by demonstrating a non-intrusive, vision-based approach to sign language interpretation. Future development may involve dynamic gesture translation, sentence-level recognition, and deployment on mobile platforms.
Determination of desalination system pricing in Penjaringan Utara subdistrict, North Jakarta using HOMER simulation Rimbawa, H. A. Danang; Nurrahman, Muhammad Irsyaad; Saragih, Gabriel Winandika
Jurnal Mandiri IT Vol. 14 No. 1 (2025): July: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v14i1.399

Abstract

The coastal area of Muara Angke in North Jakarta grapples with significant challenges regarding access to clean water, compounded by limited energy availability. In 2024, a desalination project utilizing reverse osmosis (RO) technology was launched to address this issue, with a capacity to produce 320 liters of clean water per hour. A key feature of this initiative is its reliance on solar energy, which offers a sustainable solution to the region’s energy constraints. However, to ensure the project's long-term viability, it is essential to conduct an economic evaluation, particularly focusing on the cost of producing the desalinated water. This cost is intricately linked to the energy required to power the reverse osmosis (RO) system. Specifically, the Cost of Energy (CoE) plays a crucial role in determining the price of the desalinated water. To assess the economic feasibility of the solar-powered desalination system, HOMER simulation software was used to model the performance of the solar power system, considering factors such as solar energy potential, system capacity, and the financial costs of the solar infrastructure, including the solar panels, inverters, and battery storage. The simulation results reveal an annual energy production of 58,900 kWh and a CoE of Rp 575.55 per kWh, which directly influences the cost of water production, resulting in a price of Rp 17.27 per liter for the desalinated water. This study highlights the essential role of renewable energy sources in ensuring the sustainability of desalination systems and emphasizes the importance of accurate cost analysis to make such systems economically viable in coastal communities like Muara Angke. By integrating RO technology with solar energy, this initiative offers a promising approach to addressing water scarcity while reducing reliance on non-renewable energy sources, ultimately providing a long-term solution to clean water access.
Machine learning-based approach for evaluating physical fitness through motion detection Rais, M. Fazil; Chadafa Zulti Noorta; M. Ilham AlFatrah; H.A Danang Rimbawa; Fatmawati, Uvi Desi
Jurnal Mandiri IT Vol. 14 No. 1 (2025): July: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v14i1.406

Abstract

Physical fitness assessment is crucial for evaluating an individual's physical performance and endurance. However, traditional methods often rely on manual observation, which can lead to subjectivity and inconsistent results. This study proposes a machine learning-based approach for physical fitness evaluation through motion detection using pose estimation and exercise classification models. A quantitative method was employed to train and evaluate models for four exercise types: push-ups, sit-ups, pull-ups, and chinning. Each model was trained separately and assessed using accuracy, precision, recall, and F1-score metrics, achieving accuracies of 97.50% for push-ups, 97.67% for sit-ups, 97.00% for pull-ups, and 98.50% for chinning. The maximum error margin compared to manual counting was 2.48%. System-generated outputs were validated against manual observations using standard evaluation matrices. These findings indicate that machine learning can offer a reliable, consistent, and automated solution for physical fitness assessment, with the potential to enhance training programs, support remote fitness monitoring, and reduce human error in performance evaluation.
Portable oceanic solutions for enhanced IoT-based desalination and salt extraction (POSEIDON) Randi Agustio; Onky Prilianda Putra; Dananjaya Ariateja; Refino Maulana Hansbullah Subarkah; H. A Danang Rimbawa
Jurnal Mandiri IT Vol. 14 No. 1 (2025): July: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The clean water crisis remains a significant challenge in many remote areas, particularly on small islands in Indonesia where freshwater resources are limited. Desalination technology offers a promising solution; however, conventional methods often face obstacles such as high energy consumption, costly operations, and limited real-time water quality monitoring. This study aims to design and evaluate a distillation-based desalination device integrated with Internet of Things (IoT) technology, called POSEIDON. The system utilizes solar energy and heating elements to support the distillation process and is equipped with pH, TDS, ultrasonic, and water level sensors connected to the Blynk application for real-time monitoring and alert notifications. Testing was conducted over 10 hours under both daytime and nighttime conditions. Results show that the distilled water had pH values ranging from 7.01 to 7.51 and PPM values from 798 to 588.38. One-way ANOVA indicated no statistically significant variation (p > 0.05), demonstrating consistent system performance. The average volume of fresh water produced was 0.403 liters from 0.7 liters of seawater, with an average salt yield of 23.1 grams. POSEIDON exhibits good energy efficiency and portability, and it can operate at night. Nevertheless, improvements are needed in production capacity and water quality. Overall, POSEIDON presents a viable and sustainable solution to meet clean water needs in remote, water-scarce regions.
Co-Authors Abdillah, Abdillah Imam Julianto Abdul Jabar, Jaka Abdurrachman, Fauzi Alam, Sirojul AlFatrah, M. Ilham Amalia, Nuke Andri Purwoko Anton Nugroho Ari Susanti Aritonang, Sovian Atika Mima Amalin Atturoybi, Abdurrosyid Aulia Khamas H Bambang Suhardjo Bambang Suharjo Bangun, Abbas Madani Bisyron Wahyudi Bisyron Wahyudi Budi Rahardjo Budi Raharjo Chadafa Zulti Noorta Dahlan, Iqbal Ahmad Dananjaya Ariateja Fadhil Muhammad Hadini Faidin, Firman Firdaus, Muhammad Azka Gilang Prakoso Hasibuan, Bayu Nuar Khadapi Heikhmakhtiar, Aulia Khamas Heri Azhari Noor Hery Sudaryanto I Made Wiryana I Made Wiryana Kencana, Lisdi Inu Luqman, Fathan M. Fachrurrozy M. Ilham AlFatrah Madramsyah, Adam Maya Ayu Riestiyowati Miptahudin, Apip Muhamad Zein Satria Ni Putu Ayu Astriyani Noorta, Chadafa Zulti Nurrahman, Muhammad Irsyaad Onky Prilianda Putra Passu Beta, Arga Husein Prakosa, Setya Widyawan Puri Ratna Larasati Puringgar Prasadha Putra, Rayasa Rais, M. Fazil Randi Agustio Ra’idah Naufaliana Dewi Refino Maulana Hansbullah Subarkah Richardus Eko Indrajit Riswantoro, Dadan Shavkat Ruby Alamsyah Rustam, Muh Zul Azhri Saputro, J.W. Saputro, Joko W. Saragih, Gabriel Winandika Sastradinata, Aria Kusumah Sembali, Tryas Putranto Setyowati, Danny Suhardiningsih, A.V. Sri Suharjo, Bambang Sunarta Sunarta Supriyadi, Devi Tangang Qisthina Handayani Zatadini Taqwa, Rangga Teddy Mantoro Tidar, R Haryo Tutun Juhana Uvi Desi Fatmawati Versantariqh, Muhammad Azka Wahyudi, Bisyron Wibisono, Nugroho Yosef Prihanto Yudistira Asnar